CVE-2026-35547
- EPSS 0.09%
- Veröffentlicht 30.04.2026 08:08:13
- Zuletzt bearbeitet 01.05.2026 16:16:30
When processing the header of an incoming message, libnv failed to properly validate the message size. The lack of validation allows a malicious program to write outside the bounds of a heap allocation. This can trigger a crash or system panic, and...
CVE-2026-39457
- EPSS 0.02%
- Veröffentlicht 30.04.2026 08:01:49
- Zuletzt bearbeitet 01.05.2026 12:41:46
When exchanging data over a socket, libnv uses select(2) to wait for data to arrive. However, it does not verify whether the provided socket descriptor fits in select(2)'s file descriptor set size limit of FD_SETSIZE (1024). An attacker who is able...
CVE-2026-42512
- EPSS 0.18%
- Veröffentlicht 30.04.2026 07:58:37
- Zuletzt bearbeitet 01.05.2026 16:16:32
As dhclient is building an environment to pass to dhclient-script, it may need to resize the array of string pointers. The code which expands the array incorrectly calculates its new size when requesting memory, resulting in a heap buffer overrun. ...
CVE-2026-7164
- EPSS 0.19%
- Veröffentlicht 30.04.2026 07:23:52
- Zuletzt bearbeitet 01.05.2026 12:46:59
Incorrect packet validation allowed unbounded recursion parsing SCTP chunk parameters. This can eventually result in a stack overflow and panic. Remote attackers can craft packets which cause affected systems to panic. This affects any system wher...
CVE-2026-7270
- EPSS 0.02%
- Veröffentlicht 30.04.2026 07:16:41
- Zuletzt bearbeitet 10.05.2026 08:16:08
An operator precedence bug in the kernel results in a scenario where a buffer overflow causes attacker-controlled data to overwrite adjacent execve(2) argument buffers. The bug may be exploitable by an unprivileged user to obtain superuser privilege...
CVE-2026-42511
- EPSS 0.09%
- Veröffentlicht 30.04.2026 07:16:37
- Zuletzt bearbeitet 01.05.2026 16:16:32
The BOOTP file field is written to the lease file without escaping embedded double-quotes, allowing injection of arbitrary dhclient.conf directives. When the lease file is subsequently re-parsed by dhclient, e.g., after a system restart, an attacker...
CVE-2026-6386
- EPSS 0.02%
- Veröffentlicht 22.04.2026 02:33:24
- Zuletzt bearbeitet 01.05.2026 12:49:08
In order to apply a particular protection key to an address range, the kernel must update the corresponding page table entries. The subroutine which handled this failed to take into account the presence of 1GB largepage mappings created using the sh...
CVE-2026-5398
- EPSS 0.02%
- Veröffentlicht 22.04.2026 02:23:56
- Zuletzt bearbeitet 01.05.2026 12:49:44
The implementation of TIOCNOTTY failed to clear a back-pointer from the structure representing the controlling terminal to the calling process' session. If the invoking process then exits, the terminal structure may end up containing a pointer to fr...
CVE-2026-4748
- EPSS 0.06%
- Veröffentlicht 01.04.2026 06:18:52
- Zuletzt bearbeitet 02.04.2026 20:47:20
A regression in the way hashes were calculated caused rules containing the address range syntax (x.x.x.x - y.y.y.y) that only differ in the address range(s) involved to be silently dropped as duplicates. Only the first of such rules is actually load...
CVE-2026-4747
- EPSS 0.1%
- Veröffentlicht 26.03.2026 06:21:12
- Zuletzt bearbeitet 20.04.2026 13:47:31
Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is sufficiently large, and a malicious client can trig...